Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe
Resource
win10-20230220-en
General
-
Target
4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe
-
Size
668KB
-
MD5
dc413d50e28682b9a1a535d42e36ecbb
-
SHA1
e53fe39a2524c06e84b4f784ddec5825ef3043d1
-
SHA256
4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df
-
SHA512
e026d3fa86d7e334db4264cc5948e6a4e789ccd7609af2b85d2248042522a07efdb436ccd68b1cf30f71c114bf89ac2dfcaa66d08b21736d70edf93ea347db22
-
SSDEEP
12288:VMrQy905e0ZvEdrZhCYEgHw3+58Q3AQTsX4oDxddTIocUwlIQNgKc:JyT0ZsRpEgQSlArDbdTIocUwl2Kc
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
gonna
193.56.146.220:4174
-
auth_value
10ce5127fa09a5422f1a407fb6a7c077
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r5483ui.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/820-122-0x0000000000690000-0x00000000006D6000-memory.dmp family_redline behavioral1/memory/820-123-0x00000000022D0000-0x0000000002314000-memory.dmp family_redline behavioral1/memory/820-124-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-125-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-127-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-129-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-131-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-133-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-135-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-137-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-139-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-141-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-143-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-145-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-147-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-149-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-151-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-153-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-155-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-157-0x00000000022D0000-0x000000000230E000-memory.dmp family_redline behavioral1/memory/820-286-0x0000000004B60000-0x0000000004BA0000-memory.dmp family_redline behavioral1/memory/820-1033-0x0000000004B60000-0x0000000004BA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1128 ycJl5072XD.exe 1988 r5483ui.exe 820 w27sx56.exe 1368 xGexL37.exe -
Loads dropped DLL 10 IoCs
pid Process 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 1128 ycJl5072XD.exe 1128 ycJl5072XD.exe 1128 ycJl5072XD.exe 1988 r5483ui.exe 1128 ycJl5072XD.exe 1128 ycJl5072XD.exe 820 w27sx56.exe 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 1368 xGexL37.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features r5483ui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r5483ui.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycJl5072XD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycJl5072XD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1988 r5483ui.exe 1988 r5483ui.exe 820 w27sx56.exe 820 w27sx56.exe 1368 xGexL37.exe 1368 xGexL37.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1988 r5483ui.exe Token: SeDebugPrivilege 820 w27sx56.exe Token: SeDebugPrivilege 1368 xGexL37.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1716 wrote to memory of 1128 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 28 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 1988 1128 ycJl5072XD.exe 29 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1128 wrote to memory of 820 1128 ycJl5072XD.exe 30 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32 PID 1716 wrote to memory of 1368 1716 4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe"C:\Users\Admin\AppData\Local\Temp\4348d9c045b8aeddf541fda8faa613e722731affc165e83b16788a6da549c4df.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycJl5072XD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycJl5072XD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5483ui.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5483ui.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w27sx56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w27sx56.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xGexL37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xGexL37.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ddaf6a7e4c6bd55f4001a68b41020710
SHA1cc50a5dd9e0b1be80c43b0850c002e0484b5d2ad
SHA2565669aa2a6e00d71f9ca012fecdea7ec1134e22f4ac349106af7f7e5372a5b6a8
SHA51202ececce795610f012f81feb1ec338dabedfbbfe0461df7352b1600cc04b6f5b8e14ebd715ba3ff32a3d5a75345eddd26cae6059bad48e3fda93e61cffac4d51
-
Filesize
175KB
MD5ddaf6a7e4c6bd55f4001a68b41020710
SHA1cc50a5dd9e0b1be80c43b0850c002e0484b5d2ad
SHA2565669aa2a6e00d71f9ca012fecdea7ec1134e22f4ac349106af7f7e5372a5b6a8
SHA51202ececce795610f012f81feb1ec338dabedfbbfe0461df7352b1600cc04b6f5b8e14ebd715ba3ff32a3d5a75345eddd26cae6059bad48e3fda93e61cffac4d51
-
Filesize
523KB
MD5f20c284dcf6907af5a30a817946851d1
SHA1331d9cdcd9ccbaf8db07db8939ceacbc8079e5db
SHA2568681e7dec36ecbe4aca42659a949d6fdff4fcee3a5576ec9fe89b82aa58e8d0e
SHA5127100dd3a6b66082888214895ff50a83bc9acb2d84a12a6389a54e63f3081b537e074cdfbb16588ccf73388d5ea8b03b45e8d1622e2a068ebbbb223dc06b507ac
-
Filesize
523KB
MD5f20c284dcf6907af5a30a817946851d1
SHA1331d9cdcd9ccbaf8db07db8939ceacbc8079e5db
SHA2568681e7dec36ecbe4aca42659a949d6fdff4fcee3a5576ec9fe89b82aa58e8d0e
SHA5127100dd3a6b66082888214895ff50a83bc9acb2d84a12a6389a54e63f3081b537e074cdfbb16588ccf73388d5ea8b03b45e8d1622e2a068ebbbb223dc06b507ac
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668
-
Filesize
175KB
MD5ddaf6a7e4c6bd55f4001a68b41020710
SHA1cc50a5dd9e0b1be80c43b0850c002e0484b5d2ad
SHA2565669aa2a6e00d71f9ca012fecdea7ec1134e22f4ac349106af7f7e5372a5b6a8
SHA51202ececce795610f012f81feb1ec338dabedfbbfe0461df7352b1600cc04b6f5b8e14ebd715ba3ff32a3d5a75345eddd26cae6059bad48e3fda93e61cffac4d51
-
Filesize
175KB
MD5ddaf6a7e4c6bd55f4001a68b41020710
SHA1cc50a5dd9e0b1be80c43b0850c002e0484b5d2ad
SHA2565669aa2a6e00d71f9ca012fecdea7ec1134e22f4ac349106af7f7e5372a5b6a8
SHA51202ececce795610f012f81feb1ec338dabedfbbfe0461df7352b1600cc04b6f5b8e14ebd715ba3ff32a3d5a75345eddd26cae6059bad48e3fda93e61cffac4d51
-
Filesize
523KB
MD5f20c284dcf6907af5a30a817946851d1
SHA1331d9cdcd9ccbaf8db07db8939ceacbc8079e5db
SHA2568681e7dec36ecbe4aca42659a949d6fdff4fcee3a5576ec9fe89b82aa58e8d0e
SHA5127100dd3a6b66082888214895ff50a83bc9acb2d84a12a6389a54e63f3081b537e074cdfbb16588ccf73388d5ea8b03b45e8d1622e2a068ebbbb223dc06b507ac
-
Filesize
523KB
MD5f20c284dcf6907af5a30a817946851d1
SHA1331d9cdcd9ccbaf8db07db8939ceacbc8079e5db
SHA2568681e7dec36ecbe4aca42659a949d6fdff4fcee3a5576ec9fe89b82aa58e8d0e
SHA5127100dd3a6b66082888214895ff50a83bc9acb2d84a12a6389a54e63f3081b537e074cdfbb16588ccf73388d5ea8b03b45e8d1622e2a068ebbbb223dc06b507ac
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
249KB
MD573e75c38ae4a49b8db75437acf5ffcc1
SHA11e01eab64dc1326cb3ef96fad41f58abd44db2cf
SHA2567ba7de1832ba129a983bf0551faef469522249e9c7dac96cc131c17503bb5bc6
SHA512f664b8fda82ddfff920635ca1235c0a34f00a27bfca7fcd80eb63ceb3712e04ab1ec2ecb378d8164c1f9b7016bca7d29ea447260d05c99ad909af99b2453b346
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668
-
Filesize
306KB
MD5434b037af289fae120e4fb8480bfb42c
SHA176b729fcbe9d883bbee17e5ca8d76fc04aee3d8f
SHA2560708f7d381d1a639b56219192bcff33a6177624b7be16103e59e55a6d7a8f99d
SHA5125433a867fb18dd38402f44336de57365edcb8d0b848e350c1a6c5fc39af6f9364caee612bce8120f1f1af1c45a0d28a23dcbff5006679a2f7964007a46569668